next up previous
Next: About this document Up: A First Step towards Previous: Acknowledgments

References

BAN89
M. Burrows, M. Abadi, and R. Needham. A logic of authentication. Technical Report 39, DEC Systems Research Center, February 1989.

CGP99
Edmund Clarke, Orna Grumberg, and Doron Peled. Model Checking. MIT Press, 1999.

CJM98
E.M. Clarke, S. Jha, and W. Marrero. Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In In Proceedings of the IFIP Working Conference on Programming Concepts and Methods (PROCOMET), 1998.

DY89
D. Dolev and A. Yao. On the security of public key protocols. IEEE Transactions on Information Theory, 29(2):198-208, March 1989.

HT96
N. Heintze and J. Tygar. A model for secure protocols and their compositions. IEEE Transactions on Software Engineering, 22(1):16-30, January 1996.

Int93
International Standards Organization. Information Technology - Security techniques -- Entity Authentication Mechanisms Part 3: Entity authentication using symmetric techniques, 1993. ISO/IEC 9798.

Low96
G. Lowe. Breaking and fixing the Needham-Schroeder public-key protocol using FDR. In Tools and Algorithms for the Construction and Analysis of Systems, volume 1055 of Lecture Notes in Computer Science, pages 147-166. Springer-Verlag, 1996.

Low97
G. Lowe. A hierarchy of authentication specifications. In Proceedings of the 1997 IEEE Computer Society Symposium on Research in Security and Privacy, pages 31-43, 1997.

Mea94
C. Meadows. A model of computation for the NRL protocol analyzer. In Proceedings of the 1994 Computer Security Foundations Workshop. IEEE Computer Society Press, June 1994.

Mea95
C. Meadows. Formal verification of cryptographic protocols: A survey. In Advances in Cryptology - Asiacrypt '94, volume 917 of Lecture Notes in Computer Science, pages 133-150. Springer-Verlag, 1995.

Mil95
J. Millen. The Interrogator model. In Proceedings of the 1995 IEEE Symposium on Security and Privacy, pages 251-260. IEEE Computer Society Press, 1995.

MMS97
J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using murϕ. In Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997.

RN95
Stuart Russell and Peter Norvig. Artificial Intelligence: A Modern Approach. Prentice Hall Series in Artificial Intelligence, 1995.

Son99
Dawn Song. Athena: An automatic checker for security protocol analysis. In Proceedings of the 12th Computer Science Foundation Workshop, 1999.

THG98
F.Javier Thayer, Jonathan C. Herzog, and Joshua D. Guttman. Strand spaces: Why is a security protocol correct? In Proceedings of 1998 IEEE Symposium on Security and Privacy, 1998.

WL93
T. Y. C. Woo and S. S. Lam. A semantic model for authentication protocols. In Proceedings of the IEEE Symposium on Research in Security and Privacy, 1993.


next up previous
Next: About this document Up: A First Step towards Previous: Acknowledgments

Adrian Perrig
Fri Sep 1 21:14:38 PDT 2000